Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

API Security Testing Checklist for Developers

APIs are the backbone of modern applications, facilitating seamless communication and data exchange. However, this ubiquity makes them prime targets for cyberattacks. As developers, building robust and secure APIs isn't just a best practice; it's a critical responsibility. This blog post provides a comprehensive API security testing checklist to help you identify and mitigate API vulnerabilities, ensuring your APIs are fortified against evolving threats.

Cloudflare Containers: Run Any App on Workers (with Demos)

In this clip from our show, Confidence Okoghenun, Senior Systems Engineer at Cloudflare, introduces the public beta of Containers on Cloudflare Workers, a significant development for developers. He explains how containers package applications with all their dependencies, allowing almost any app to run reliably on Workers. Confidence also shares two demos: a full Linux desktop running in the browser and a video-to-GIF converter, showcasing the flexibility and integration with other Cloudflare services.

Why Students Should Use a Punctuation Checker

Whether you're writing an essay, submitting a scholarship application, or just emailing a professor, punctuation errors can leave the wrong impression. A missed comma, incorrect apostrophe, or run-on sentence can easily shift the meaning of your message-and your grade. That's why every student should consider using a punctuation checker.

How to Automate Device Onboarding in IoT at Scale

Device onboarding encompasses the entire process of integrating new IoT devices into an organization’s network infrastructure, from initial discovery and authentication to configuration management and ongoing monitoring. This process becomes exponentially complex as device populations grow and diversify. Traditional onboarding approaches often rely on manual configuration, pre-shared keys, or simple certificate-based authentication that requires significant human intervention.

Protecting Digital Transactions with API and Web Application Security

Protecting Digital Transactions with API and Web Application Security In this video, A10 Networks' Jamison Utter and Gary Wang discuss why a different approach to security is required beyond purely transactional-based protection and detection. They delve into how entity-based tracking helps address the challenges of legitimate-looking requests that carry malicious intent, particularly in the context of Application programming interfaces (API) security and advanced threats, such as Layer 7 DDoS attacks.

Generative AI Security: Why Protection Can't Keep Pace with Innovation

The artificial intelligence revolution isn’t coming. It’s here and it’s moving faster than anyone predicted. Children now trust ChatGPT more than their parents for information. AI-generated content is becoming indistinguishable from human work. Entire industries are being reshaped by technology that seemed like science fiction just a few years ago.

Seamless API Security with Postman x Aikido

We’re teaming up with our friends at Postman to bring API security even closer to where developers already work. With the upcoming Aikido Security + Postman integration, you’ll be able to view recent security scans for your API collections—without ever leaving Postman. No new tabs. No switching tools. Just quick, clear security insights as you’re building. It’s never been easier to build and scale secure APIs as your organization grows.

Why RBAC Doesn't Work with AI Agents [And How to Fix It]

Role-Based Access Control (RBAC) is a fundamental, critical part of security architecture that prevents data from falling into the wrong hands. In regular data-based environments (deployed on the cloud or on-premise), RBAC is an effective measure in preventing unauthorized access, with a few exceptions, like successful hacking attempts or breaches. However, this system breaks down once AI comes into the picture. Let’s understand why – and what you can do about it.